. .
Building a Resilient Banking Institution: Operational Resilience Implementation at China Construction Bank (Malaysia)
OR BB FI MY Gen-5

[OR] [CCB] [E3] [CBS] [1] [SuPS] Identify Severe but Plausible Scenarios

New call-to-action

Under the operational resilience framework, China Construction Bank (Malaysia) Berhad (CCB Malaysia) must identify Severe but Plausible (SBP) Scenarios that could disrupt its Critical Business Services (CBS).

As highlighted in the referenced guidance, SBP scenarios are events that are extreme in impact yet realistic in likelihood, based on the institution’s risk profile, operating environment, and threat landscape.

For CBS-1: Core Deposit & Account Services, disruption could severely affect customers’ access to funds, payment obligations, regulatory compliance, and financial stability.

Therefore, scenario design must integrate cyber risks, ICT failures, third-party dependencies, operational errors, and external threats, ensuring alignment with the bank’s overall technology and cyber risk management framework.

New call-to-action

Moh Heng Goh
Operational Resilience Certified Planner-Specialist-Expert

[OR] [CCB] Legal Disclaimer Banner

New call-to-action

 CBS-1 Core Deposit & Account Services

Introduction

[OR] [CCB] [E3] [CBS] [1] [SuPS] Identify Severe but Plausible Scenarios

Under the operational resilience framework, China Construction Bank (Malaysia) Berhad (CCB Malaysia) must identify Severe but Plausible Scenarios (SbPS) that could disrupt its Critical Business Services (CBS).

New call-to-actionAs highlighted in the referenced guidance, SBP scenarios are events that are extreme in impact yet realistic in likelihood, based on the institution’s risk profile, operating environment, and threat landscape.

For CBS-1: Core Deposit & Account Services, disruption could severely affect customers’ access to funds, payment obligations, regulatory compliance, and financial stability.

Therefore, scenario design must integrate cyber risks, ICT failures, third-party dependencies, operational errors, and external threats, ensuring alignment with the bank’s overall technology and cyber risk management framework.

The table below outlines the recommended SBP scenarios for each Sub-CBS, including impact assessments, proactive mitigation measures, and explicit linkages to Cyber and ICT risk integration.

Banner [Table] [OR] [E3] Identify Severe but Plausible Scenarios

Table P5: Detailed Processes for CBS-1

Sub-CBS Code

Sub-CBS

Severe but Plausible Scenario

Impact / Effect

Proactive Risk Management Action

Link to Integration of Cyber and ICT Risks

1.1

Account Opening & Onboarding

Prolonged outage of the digital onboarding platform due to a ransomware attack on customer onboarding servers

Inability to open new accounts; onboarding backlog; KYC delays; reputational damage

Implement endpoint detection & response (EDR); segregate onboarding servers; maintain offline KYC processing capability; conduct cyber recovery drills

Integration with Cyber Security Framework (NIST/ISO 27001), secure SDLC, identity & access management (IAM), ransomware resilience testing

1.2

Deposit Maintenance & Account Administration

Core banking system configuration corruption following failed system patch update

Inaccurate customer data; inability to update account details; regulatory reporting inaccuracies

Change management controls; pre-production testing; system rollback capability; automated data reconciliation

ICT change management governance; patch management controls; configuration monitoring tools

1.3

Deposit Transactions Processing

Data centre outage due to a power failure, combined with DR replication lag

Customers unable to access funds; ATM/online transaction failures; liquidity stress

Active-active data replication; periodic DR failover testing; UPS & generator redundancy; real-time monitoring

Data centre resilience strategy; Recovery Time Objective (RTO)/Recovery Point Objective (RPO) alignment; infrastructure redundancy

1.4

Interest & Charges Calculation & Posting

Batch processing engine failure at month-end caused by database overload or cyber intrusion

Incorrect interest postings; financial misstatements; customer disputes

Capacity stress testing; automated reconciliation controls; database activity monitoring; segregation of duties

Database security controls, ICT capacity planning, privileged access management

1.5

Account Inquiry & Statement Services

A Distributed Denial of Service (DDoS) attack on an internet banking platform

Customers unable to view balances; surge in call centre traffic; reputational impact

DDoS mitigation services; traffic filtering; multi-channel access (branch, RM support); communication protocol

Network security architecture; SOC monitoring; cyber threat intelligence integration

1.6

Transfer & Payment Execution

Malware infection affecting the payment gateway interface with RENTAS/FPX/SWIFT

Payment delays or failures; settlement breach; regulatory penalties; systemic risk implications

Network segmentation; real-time transaction monitoring; payment contingency procedures; secure SWIFT controls (CSP compliance)

SWIFT Customer Security Programme (CSP); payment system cybersecurity controls; transaction anomaly detection systems

1.7

Foreign Currency Deposit Services

Disruption of the external FX rate feed provider due to a third-party cyber incident

Incorrect FX conversion rates; financial losses; customer disputes

Third-party risk assessments; secondary FX data provider; automated rate validation controls

Third-party ICT risk management; API security controls; vendor resilience testing

1.8

Account Closure & Dormancy Management

Failure of the AML monitoring system due to a software defect or a cyber compromise

Inadequate dormancy controls; AML/CFT compliance breach; regulatory sanctions

Periodic AML system validation; manual oversight review; backup compliance monitoring process

AML system cybersecurity controls; data integrity checks; compliance system redundancy

Key Risk Themes Identified

Across CBS-1, the most material Severe but Plausible Scenarios involve:

  • Cyber threats (ransomware, DDoS, malware, data corruption)
  • ICT infrastructure failures (data centre outages, system overloads)
  • Third-party service disruptions (FX data providers, payment gateways)
  • Change management weaknesses
  • Data integrity and reconciliation risks

Integration with Cyber and ICT risk frameworks ensures that resilience measures are not siloed but embedded within enterprise-wide security governance, including Security Operations Centre (SOC) monitoring, threat intelligence, privileged access management, and disaster recovery strategies.

 

Banner [Summing] [OR] [E3] Identify Severe but Plausible Scenarios

Identifying Severe but Plausible Scenarios for CBS-1: Core Deposit & Account Services enables China Construction Bank (Malaysia) to rigorously test its resilience posture against high-impact, realistic disruption events.

These scenarios ensure that the bank moves beyond theoretical risk assessment to practical stress-testing of operational capabilities.

By integrating cyber security, ICT resilience, third-party risk management, and governance controls into scenario planning, CCB Malaysia strengthens its ability to anticipate, withstand, and recover from operational shocks.

This structured identification of SBP scenarios supports regulatory compliance, safeguards customer interests, and reinforces confidence in the bank’s core deposit and payment services—ensuring sustainable operational resilience in an increasingly digital and interconnected banking environment.

 

Building a Resilient Banking Institution: Operational Resilience Implementation at China Construction Bank (Malaysia)

 

 

 

 

eBook 3: Starting Your OR Implementation
       
CBS-1 Core Deposit & Account Services        
CBS-1 DP CBS-1 MD CBS-1 MPR CBS-1 ITo CBS-1 SuPS  CBS-1 ST  eBook 2        
[OR] [CCB] [E3] [CBS] [1] [DP] Core Deposit & Account Services [OR] [CCB] [E3] [CBS] [1] [MD] Map Dependency [OR] [CCB] [E3] [CBS] [1] [MPR] Map Processes and Resources [OR] [CCB] [E3] [CBS] [1] [ITo] Establish Impact Tolerances [OR] [CCB] [E3] [CBS] [1] [SuPS] Identify Severe but Plausible Scenarios [OR] [CCB] [E3] [CBS] [1] [ST] Perform Scenario Testing eBook Cover [OR] [CCB] [E2] [2D]       New call-to-action

New call-to-actionNew call-to-actionGain Competency: For organisations looking to accelerate their journey, BCM Institute’s training and certification programs, including the OR-5000 Operational Resilience Expert Implementer course, provide in-depth insights and practical toolkits for effectively embedding this model.

 

 

More Information About OR-5000 [OR-5] or OR-300 [OR-3]

To learn more about the course and schedule, click the buttons below for the OR-300 Operational Resilience Implementer course and the OR-5000 Operational Resilience Expert Implementer course.

BL-OR-3 Register Now BL-OR-3_Tell Me More BL-OR-3_View Schedule
BL-OR-5_Register Now BL-OR-5_Tell Me More  [BL-OR] [3-4-5] View Schedule
[BL-OR] [3] FAQ OR-300

If you have any questions, click to contact us.Email to Sales Team [BCM Institute]

FAQ BL-OR-5 OR-5000
OR Implementer Landing Page

New call-to-action

New call-to-action

 

Comments:

 

CTA Banner_OR

CTA Banner_ORA

CTA Banner_BCM

CTA Banner_ITDR

CTA Banner_CM